BF-TR925D DMR UV Dual Band Repeater
BF-TR925D portable dual band repeater is specially designed for rapid deployment during emergency response. Compliant with military standards, sturdy, and durable, it can be vehicle-mounted or man-packed. BF-TD925D works with BF-TR900 digital repeater and BF-TR925 portable repeater, or networks independently, to realize hierarchical networking and command, as well as extend communication range. Different frequencies of various departments manage to transmit in the same network, which makes an all-in-one communication network realize wider cooperation. Organizations are better equipped to efficiently organize and share their resources during response operations.
Dual Band Interoperability, Communicate in an Instant
The device is valuable as it performs across multiple digital and analog networks and operates in any of two bands (VHF and UHF) for instant interoperability. Now you can efficiently manage mission-critical voice and data in any environment, and significantly improve your safety and response time.
Air Interface ID Authentication
Only ID-authenticated legitimate terminals can activate repeaters for voice and data service forwarding, thus avoiding illegal users from stealing and occupying channel resources and affecting normal communications.
FEATURES AND DETAILS
•IP68 protection.
•Rouge and robust, designed as per MIL-STD-810F/G.
•Advanced privacy with AES256/ARC4 digital encryption.
•Modular design, easy to maintain and repair.
•Flexible and power self-adaptive by different installations:
•-Manpack with battery mode (with manpack kit, output power 3-15W)
•-Desktop/vehicular mode (with AC/DC mounting kit, output power 5-25W)
•IP connectivity multi-site connection (with specialized Ethernet cable).
•Full duplex communication as DMR base radio (with remote control microphone).
•Inbuilt GPS, (optional).
•Ad Hoc networking function (optional):
•-Single band networking to realize multi-cascade jump, covers last mile communication.
•-Dual band networking to realize multi-cascade jump, links, and connect two Ad Hoc networks.
•Self-destructing function to turn data to dust on command in case of information leakage.
•Power-on password to ensure information security.